From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
Dan Boheh of Stanford University is teaching a free cryptography class starting in January.schneier From Schneier on Security | November 22, 2011 at 11:59 AM
A hack against a SCADA system controlling a water pump in Illinois destroyed the pump.
We know absolutely nothing here about the attack or the attacker's motivations...schneier From Schneier on Security | November 21, 2011 at 12:57 PM
Some squid can switch their camouflage instantly.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered...schneier From Schneier on Security | November 18, 2011 at 10:41 PM
I write a lot about altruism, fairness, and cooperation in my new book (out in February!), and this sort of thing interests me a lot:
In a new study, researchers...schneier From Schneier on Security | November 18, 2011 at 11:50 AM
The European Union has banned X-ray full body scanners at airports. Millimeter wave scanners are allowed as long as they conform to privacy guidelines.
UnderArticle...schneier From Schneier on Security | November 17, 2011 at 07:13 PM
Interesting:
The researchers interviewed 52 convicted murderers, 14 of them ranked as psychopaths according to the Psychopathy Checklist-Revised, a 20-item assessment...schneier From Schneier on Security | November 17, 2011 at 12:37 PM
Really nice article on crypotographer Paul Kocher and his company, Cryptography Research, Inc. schneier From Schneier on Security | November 16, 2011 at 10:45 PM
I thought this was very interesting. His three principles are:
Avoid dangerous people and dangerous places.
Do not defend your property.
Respond immediately and...schneier From Schneier on Security | November 16, 2011 at 03:17 PM
There's a group who charges to make social engineering calls to obtain missing personal information for identity theft.
This doesn't surprise me at all. Fraud...schneier From Schneier on Security | November 15, 2011 at 11:26 AM
From Mikko Hypponen: "We found a malware sample. Which was signed. With a valid certificate. Belonging to the Government of Malaysia."schneier From Schneier on Security | November 14, 2011 at 08:02 PM
This seems like a bad vulnerability:
Researchers have demonstrated a vulnerability in the computer systems used to control facilities at federal prisons that could...schneier From Schneier on Security | November 14, 2011 at 01:14 PM
It's taken me a few years, but I've come around to this buzzword. It highlights an important characteristic of a particular sort of Internet attacker.
A conventional...schneier From Schneier on Security | November 9, 2011 at 07:51 PM
It's a crime with finesse:
But he is actually a middle-aged or older man who has been doing this for a very long time. And he is a fading breed.
"It's like a...schneier From Schneier on Security | November 7, 2011 at 06:43 PM
This sort of thing seems like a decent approach, but it has a lot of practical problems:
In the wake of Wikileaks, the Department of Defense has stepped up its...schneier From Schneier on Security | November 7, 2011 at 12:26 PM
Someone edited Star Trek IV, removing the whales and replacing them with giant squid.
As usual, you can also use this squid post to talk about the security stories...schneier From Schneier on Security | November 4, 2011 at 09:47 PM
From the Journal of Strategic Studies: "Cyber War Will Not Take Place" (full article is behind a paywall):
Abstract: For almost two decades, experts and defense...schneier From Schneier on Security | November 3, 2011 at 06:22 PM
Interesting research on how parents help their children lie about their age to get onto Facebook.
One reaction to our data might be that companies should not be...schneier From Schneier on Security | November 3, 2011 at 12:03 PM